<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ti pi</title>
    <description>The latest articles on DEV Community by ti pi (@ti_pi_31869d13400cbe9e9a9).</description>
    <link>https://dev.to/ti_pi_31869d13400cbe9e9a9</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3941255%2F7173da9d-bb17-42d0-a7a6-acda91711508.png</url>
      <title>DEV Community: ti pi</title>
      <link>https://dev.to/ti_pi_31869d13400cbe9e9a9</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ti_pi_31869d13400cbe9e9a9"/>
    <language>en</language>
    <item>
      <title>Built an API Fraud Detector After Getting Scammed — Here's How It Works</title>
      <dc:creator>ti pi</dc:creator>
      <pubDate>Wed, 20 May 2026 03:08:22 +0000</pubDate>
      <link>https://dev.to/ti_pi_31869d13400cbe9e9a9/built-an-api-fraud-detector-after-getting-scammed-heres-how-it-works-406m</link>
      <guid>https://dev.to/ti_pi_31869d13400cbe9e9a9/built-an-api-fraud-detector-after-getting-scammed-heres-how-it-works-406m</guid>
      <description>&lt;p&gt;Last month, I paid for GPT-4 API access through a relay provider and got GPT-3.5 instead. The relay was charging premium prices while downgrading models. Token counts were inflated by 30-50%. And there was a hidden system prompt injected into every request.&lt;/p&gt;

&lt;p&gt;I got scammed. So I built API DNA — a free tool that detects API fraud in seconds.&lt;/p&gt;

&lt;p&gt;The Problem: API Relays Are a Wild West&lt;/p&gt;

&lt;p&gt;The AI API market has exploded with relay/proxy providers. Some are legitimate businesses. Others are not:&lt;/p&gt;

&lt;p&gt;• Model substitution: Selling GPT-4, serving GPT-3.5-turbo&lt;br&gt;
• Token inflation: Charging for 1000 tokens when only 600 were used&lt;br&gt;
• Hidden prompt injection: Secretly injecting system prompts that consume your token budget&lt;br&gt;
• Identity fraud: Claiming to be an official endpoint while routing through cheap proxies&lt;/p&gt;

&lt;p&gt;How API DNA Works&lt;/p&gt;

&lt;p&gt;Quick Scan (3 seconds, no API key needed)&lt;/p&gt;

&lt;p&gt;Enter any API endpoint and get instant results:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Architecture Detection — Is it official, a legitimate relay, or an unknown proxy? We check IP/ASN records, response headers, server signatures, and error format fingerprints.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Model Listing — We probe /v1/models and variant endpoints to see what models are actually available.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security Headers — CORS, HSTS, CSP analysis.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Price Audit — Compare the endpoint's pricing against official rates.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Deep Scan (30 seconds, requires API key)&lt;/p&gt;

&lt;p&gt;The full DNA test with your own credentials:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Behavioral Fingerprinting — We send carefully crafted prompts that elicit unique behavioral signatures from different model families. GPT-4o responds differently from GPT-3.5, which responds differently from Claude, which responds differently from DeepSeek. These differences are structural, not just stylistic — they persist even when the model is told to impersonate another.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rare Token Probing — Each tokenizer has unique rare tokens. By probing with multilingual, mathematical, and Unicode-heavy inputs, we can identify the underlying tokenizer family, which reveals the true model.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Token Audit — We compare the token counts reported by the API against our own independent estimation. A discrepancy means someone is inflating your bill.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Speed Analysis — TTFT (Time to First Token), tokens per second, and chunk variance. Each model family has characteristic speed profiles.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security Audit — We test for hidden system prompt injection, context leakage between requests, tool call tampering, and identity consistency across probes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Trust Score — All checks are aggregated into a L0-L7 trust level with a detailed breakdown.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Real Findings&lt;/p&gt;

&lt;p&gt;In testing, we've found:&lt;/p&gt;

&lt;p&gt;• A "GPT-4" relay actually serving GPT-3.5-turbo (detected via behavioral fingerprinting)&lt;br&gt;
• Token inflation of 2-3x on popular relay services&lt;br&gt;
• Hidden system prompts consuming 50-200 tokens per request&lt;br&gt;
• Endpoints claiming official status but routing through 3rd-party proxies&lt;/p&gt;

&lt;p&gt;Try It Yourself&lt;/p&gt;

&lt;p&gt;API DNA is free to use, no signup required.&lt;/p&gt;

&lt;p&gt;• Quick Scan: Enter any API endpoint, get results in 3 seconds&lt;br&gt;
• Deep Scan: Provide your API key for full analysis in 30 seconds&lt;/p&gt;

&lt;p&gt;Every scan generates a shareable report with a unique URL and downloadable PNG image.&lt;/p&gt;

&lt;p&gt;What's Next&lt;/p&gt;

&lt;p&gt;• Provider registry with verified endpoints&lt;br&gt;
• API for programmatic scanning&lt;br&gt;
• Continuous monitoring alerts&lt;br&gt;
• Browser extension for real-time verification&lt;/p&gt;

&lt;p&gt;If you've ever used an API relay and wondered "am I getting what I paid for?", give it a try. I'd love to hear what you find.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>api</category>
      <category>security</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
